XML parsers are often the target attacks because they are the first portion of a Web service that processes input from other Web services. Poorly designed or configured XML parsers can be used to compromise the parser regardless of how secure the Web service is.
111. Which of the following are used to perform data inferences?
a. Memory and CPU channels
b. Exploitable and detectable channels
c. Storage and timing channels
d. Buffer and overt channels
112. The Web service processing model securing simple object access control protocol (SOAP) messages and extensible markup language (XML) documents does
a. Chain of auctioneers
b. Chain of providers
c. Chain of intermediaries
d. Chain of consumers
The other three choices deal with the Web services. The Web service processing model requires the ability to secure simple object access protocol (SOAP) messages and extensible markup language (XML) documents as they are forwarded along potentially long and complex chains of consumer, provider, and intermediary services. The nature of Web services processing makes those services subject to unique attacks, as well as variations on familiar attacks targeting Web servers.
113. Which of the following is not a single point-of-failure?
a. Mesh topology
b. Star topology
c. Bus topology
d. Tree topology
The other three choices are subjected to a single point-of-failure. The single central hub in star and tree topology and the single cable in bus topology are vulnerable to a single point-of-failure.
114. Which of the following describes one process signaling information to another by modulating its own use of system resources in such a way that this manipulation affects the real response time observed by the second process?
a. A communication channel
b. A covert storage channel
c. A covert timing channel
d. An exploitable channel
115. Which of the following is
a. Internet
b. Converged network
c. Password synchronization
d. Domain name system server